Identity consultancy

Overview

Control access to your resources effectively.

Allowing people to access a variety of resources is not always easy. Not only for the employees and other users, but also for those who manage it. It’s about enabling the right people access to the right resources at the right time for the right reasons.

To be confident that your data and intellectual property are safe, you need to know that your applications can only be accessed by those who have the authority. Implementing an identity and access management solution will not only improve security, but it will also save costs and give a positive user experience.

Our consultancy service will help you to successfully implement an identity and access management program, so you can take advantage the following business benefits:

Centralised management

Reduced risk of inappropriate access and fraud

Help meeting compliance requirements

Improved efficiency

The benefits.

Our approach is simple and aims to answer the question – is the access to your data managed properly?

Following our standardised approach, our accredited and highly skilled security consultants can help you to define and create end-to-end processes around your individual identity and access management model.

We are also able to provide a complete implementation of IAM, both managed and bespoke and other related services, such as privileged account management to protect, and control activity on all accounts with privileged rights.

Why BT.

Global talentWe have access to a huge pool of security talent. With over 2500 security professionals around the world, of which 500 are security consultants, you’ll have access to specialists in cyber defence, risk and compliance, application and data security and infrastructure. We can offer you the combined vast knowledge and experience of our highly skilled consultants alongside proven methodologies.

Breadth of experienceWe have the required breadth and depth of knowledge and vast experience with identity and access management, currently managing over 150M identities for our customers. Our internal deployment covers 100+ applications and is used globally by more than 150,000 users. This includes federations with third parties which simplifies and controls collaboration. We are ideally placed to help with independent advice.

AccreditationWe are accredited to deliver professional services on a global scale, meeting ISO9001:2008 quality management system standards.

Joined-up defenceBT is among only a handful of Managed Security providers that also has very strong global capabilities in Information Security Consulting and IT Risk Consulting. We are also one of only a few organisations providing integrated network and security solutions. This joined up approach means that we can look at all the elements of people, process and technology, prevent gaps and provide a joined-up strategy to protect against cyber threats.

For the growing number of enterprises seeking a broader, integrated solution rather than treating security as an isolated silo, BT can offer a one-stop shop security experience”.- John Marcus, Current Analysis. BT was ranked as “Very Strong” by Current Analysis (2016)

The details

Our approach

Our unique program and project management methodology is based on MSP and PRINCE2 and provides a flexible and stable set of operating procedures which are independent of organisation structure.

Depending on the size of the engagement project management will be done by a consultant or a dedicated project or program manager.

Our proposal will include the basics of scope and deliverables and may also include managed security services, training (on-the-job), hard and software components as well as maintenance contracts to cover hardware break/fix and/or software updates.

During the project, we will report status updates and whenever needed exception reports as well. This enables you to understand the overall progress of the project and understand whether critical issues have arisen.

The project deliverables may, depending on the scope, include design, installation and implementation documents.

In order to guarantee high quality output the project deliverables go through a peer and document quality review before they are shared with you.

Once the project has been delivered and handed over to you, the next phase starts. Manage and maintenance of any identity solution is the next challenge and requires a continued focus.